Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
Five Key Steps to Successfully Migrate to 802.11ac (Italian)
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started...
Provided By Aruba Networks
-
Five Key Steps to Successfully Migrate to 802.11ac (Spanish)
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started...
Provided By Aruba Networks
-
Five Key Steps to Successfully Migrate to 802.11ac (German)
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started...
Provided By Aruba Networks
-
Five Key Steps to Successfully Migrate to 802.11ac (French)
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started...
Provided By Aruba Networks
-
Research: Leaders share software-defined networking's benefits, obstacles, favored vendors (AU)
In April 2013, TechRepublic conducted an online survey to find out who is using software-defined networking (SDN), why they plan to implement it, and the results they've experienced.
Provided By TechRepublic
-
Low-Rate Machine-Type Communication via Wireless Device-to-Device (D2D) Links
Wireless cellular networks feature two emerging technological trends. The first is the direct Device-To-Device (D2D) communications, which enables direct links between the wireless devices that reutilize the cellular spectrum and radio interface. The second is that of Machine-Type Communications (MTC), where the objective is to attach a large number of...
Provided By Aalborg University
-
Life Management and Power Management Issues in Wireless Sensor Networks: A Survey
Wireless sensor networks consist of small nodes which sense its local environment then it done processing and send the data to the other sensor node or end user. These sensor nodes have very limited battery power, due to this reason their life is small. Power management and life management issues...
Provided By International Journal of Electronics Communication and Computer Engineering
-
A New ERA of Mobile Backhaul
To rise above the data storm and improve your bottom line, you need to prepare your backhaul networks for supporting the evolution to the next technological upgrade and the transition to heterogeneous networks comprised of both macro and metro sites. Alcatel-Lucent through its comprehensive portfolio of backhaul products and professional...
Provided By Alcatel-Lucent
-
Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets
In this paper, the authors study spectrum auction problem where each request from secondary users has spatial, temporal, and spectral features. With the requests of secondary users and the reserve price of the primary user, their goal is to design truthful mechanisms that will either maximize the social efficiency or...
Provided By Soo-Im Jansson
-
Analysis of the Uplink Maximum Achievable Rate with Location Dependent Inter-cell Signal Interference Factors Based on Linear Wyner Model
To enhance spectral efficiency, full frequency reuse has been adopted in advanced cellular communication networks, which however generates severe inter-cell co-channel interference and degrades the achievable rate at mobile terminals, especially for those located near cell boundaries. Therefore, it is of great importance and interests for network operators and service...
Provided By Institute of Electrical & Electronic Engineers
-
Performance Analysis of WDM/TDM PON Using Different EDFA Pumping Schemes
In this ambience groovy world where the bandwidth requirements has increased a lot to support wide range of applications such as HD television, video calling etc. it becomes necessary to introduce PON's. PON uses passive components to provide high data rate services to the end user,. Major components of PONs...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Water-Filling: A Geometric Approach and Its Application to Solve Generalized Radio Resource Allocation Problems
In this paper, a simple and elegant Geometric WaterFilling (GWF) approach is proposed to solve the unweighted and weighted radio resource allocation problems. Unlike the Conventional Water-Filling (CWF) algorithm, the authors eliminate the step to find the water level through solving a non-linear system from the Karush-Kuhn-Tucker conditions of the...
Provided By Ryefone Inc.
-
Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems
Inspired by recent developments in full-duplex communications, the authors propose and study new modes of operation for Cognitive Radios with the goal of achieving improved Primary User (PU) detection and/or Secondary User (SU) throughput. Specifically, they consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete Self-Interference...
Provided By University of Applied Sciences Rapperswil
-
Transmission Analysis of Optical Code Division Multiple Access (OCDMA) Communication Systems in the Presence of Noise in Local Area Network Applications
OCDMA is an essential part of the digital communication system now days for long haul, high speed networks. The biggest challenge with Optical CDMA system is to maintain the performance of the system and offer high bandwidth in case of higher number of users at minimum cost. As the number...
Provided By Menoufia University
-
Coded Wavelet Packet OFDM with Companding for PAPR Reduction
In this paper, coded wavelet packet OFDM with companding is proposed. For the proposed OFDM, at the transmitter PAPR is calculated for different coded tree structures developed and tree with minimum PAPR is selected for transmission. The proposed wavelet packet is advantageous in terms of performance as compared to without...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Capturing of HTTP Protocol Packets in a Wireless Network
The word wide revolution in wireless technology is changing the authors' lives in term of the way they learn and use. Wireless Networks fit into this because the technology has been around long enough and can provide various benefits for development in this area. The main objective of this paper...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Diversity Backpressure Scheduling and Routing with Mutual Information Accumulation in Wireless Ad-hoc Networks
The authors suggest and analyze algorithms for routing in multi-hop wireless ad-hoc networks that exploit mutual information accumulation as the physical layer transmission scheme, and are capable of routing multiple packet streams (commodities) when only the average channel state information is present and that only locally. The proposed algorithms are...
Provided By University of Southampton
-
Enhancing Information Dissemination in a Device to Device Communication Based Metapopulation using Human Mobility Trace and Beamforming
In communication network based on device to device interactions, dissemination of the information has lately picked up lot of interest. In this paper, the authors would like to propose a mechanism for studying and enhancing the dissemination of information as in the use case proposed for the future device to...
Provided By Cornell University
-
Performance Analysis of Hybrid OCDMA/WDM System Complementary Subtraction Detection Technique
The authors proposed a hybrid Optical Code Division Multiple Access (OCDMA) over Wavelength Division Multiplexing (WDM) system is proposed for supporting large numbers of subscriber for Fiber To-The-Home (FTTH) network. The system combines two different techniques, namely OCDMA and WDM in order to support many subscribers simultaneously. In this study,...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Allowing Early Inspection of Activity Data From a Highly Distributed Bodynet With a Hierarchical-Clustering-of-Segments Approach
The output delivered by body-wide inertial sensing systems has proven to contain sufficient information to distinguish between a large numbers of complex physical activities. The bottlenecks in these systems are in particular the parts of such systems that calculate and select features, as the high dimensionality of the raw sensor...
Provided By Technische Universitat Clausthal
-
Decentralizing Network Inference Problems with Multiple-Description Fusion Estimation (MDFE)
Two forms of network inference (or tomography) problems have been studied rigorously: traffic matrix estimation or completion based on link-level traffic measurements, and link-level loss or delay inference based on end-to-end measurements. These problems are often posed as UnderDetermined Linear Inverse (UDLI) problems and solved in a centralized manner, where...
Provided By University of Calgary
-
Reliablity Control Using Loss Recovery Ratio in Wireless Sensor Network
In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment, each sensor senses the information and forwarded to its cluster head and cluster head...
Provided By Interscience Open Access Journals
-
Atlas: Adaptive Topology- and Load-Aware Scheduling
The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...
Provided By Arizona State University
-
Reliable Reception of Wireless Metering Data With Protocol Coding
Stationary collectors reading wireless, battery powered smart meters, often operate in harsh channel conditions to cut network installation cost to a minimum, challenging the individual link to each meter. The desired performance measure is reliable reception of at least some data from as many as possible meters, rather than increasing...
Provided By Aalborg University
-
Adaptive Performance-Aware Distributed Memory Caching
Distributed in-memory caching systems such as memcached have become crucial for improving the performance of web applications. However, memcached by itself does not control which node is responsible for each data object, and inefficient partitioning schemes can easily lead to load imbalances. Further, a statically sized memcached cluster can be...
Provided By The George Institute for Global Health
-
Optimal Training Sequences for Joint Timing Synchronization and Channel Estimation in Distributed Communication Networks
For distributed multi-user and multi-relay cooperative networks, the received signal may be affected by Multiple Timing Offsets (MTOs) and multiple channels that need to be jointly estimated for successful decoding at the receiver. This paper addresses the design of optimal training sequences for efficient estimation of MTOs and multiple channel...
Provided By Institute of Electrical & Electronic Engineers
-
Proportional Fair MU-MIMO in 802.11 WLANs
The next generation of 802.11 WLANs is expected to support Multi-User MIMO (MUMIMO) transmission, whereby parallel transmissions can be simultaneously made to multiple stations. This significantly extends the MIMO support introduced by the 802.11n standard and is, for example, included as part of the current draft 802.11ac standard that aims...
Provided By Cornell University
-
Getting the Most Out of Your Applications With Oracle Exalogic
This paper explores how Oracle Exalogic Elastic Cloud, an engineered system for business applications, can help enterprises deploy and upgrade applications quickly, handle massive transaction volumes, maintain a consistent set of technological standards across the application stack, and connect components seamlessly. Success in these areas allows companies to improve customer...
Provided By Oracle
-
Optimal Route Selection Strategy for QoS Improvement
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Ad-hoc nodes operating in a single path, single channel model might experience packet loss and high latency...
Provided By Interscience Open Access Journals
-
Mobile Services and Network Proximity
This paper discusses several practical use cases for deploying network proximity in mobile services. The authors' research presents here mobile services oriented for either discovering new data for mobile subscribers or for delivering some customized information to them. All applications share the same approach and use the common platform, based...
Provided By Lomonosov Moscow State University
-
A Comprehensive Framework for Device-to-Device Communications in Cellular Networks
Device-To-Device (D2D) in cellular networks is a promising concept which opens up new opportunities for commercial applications but also brings new challenges for network management. In this paper, the authors propose a tractable hybrid network model where the positions of transceivers are modeled by random spatial Poisson Point Processes (PPP)....
Provided By University of Teramo
-
Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach
Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper, the authors present their research vision that aims to develop a network-based security solution combining analytical modeling, simulation and learning, together with billing and control-plane...
Provided By Imperial College London
-
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
For security applications in Wireless Sensor Networks (WSNs), choosing best algorithms in terms of energy-efficiency and of small memory requirements is a real challenge because the sensor networks must be autonomous. The authors have benchmarked on a dedicated platform some block-ciphers and have deduced the best candidates to use in...
Provided By Université de Limoges
-
Binary Energy Harvesting Channel With Finite Energy Storage
The authors consider the capacity of an energy harvesting communication channel with a finite-sized battery. As an abstraction of this problem, they consider a system where energy arrives at the encoder in multiples of a fixed quantity, and the physical layer is modeled accordingly as a finite discrete alphabet channel...
Provided By University of Mary Washington
-
Modeling/Predicting the Evolution Trend of OSN-Based Applications
While various models have been proposed for generating social/ friendship network graphs, the dynamics of user interactions through Online Social Network (OSN) based applications remain largely unexplored. The authors previously developed a growth model to capture static weekly snapshots of User Activity Graphs (UAGs) using data from popular Facebook gifting...
Provided By Association for Computing Machinery
-
Air Dominance in Sensor Networks: Guarding Sensor Motes Using Selective Interference
Securing Wireless Sensor Networks (WSNs) is a hard problem. In particular, network access control is notoriously difficult to achieve due to the inherent broadcast characteristics of wireless communications: an attacker can easily target any node in its transmission range and affect large parts of a sensor network simultaneously. In this...
Provided By University of Jyväskylä
-
Wide Band Time-Correlated Model for Wireless Communications Under Impulsive Noise Within Power Substation
The installation of wireless technologies in power substations requires characterizing the impulsive noise produced by the high-voltage equipment. Substation impulsive noise might interfere with classic wireless communications and none of the existing models can reliably represent this noise in wide band. Previous studies have shown that impulsive noise is characterized...
Provided By Institute of Electrical & Electronic Engineers
-
On the Capacity Bounds for Poisson Interference Channels
The Poisson interference channel, which models optical communication systems with multiple transceivers, is investigated. Conditions for the strong interference regime are characterized and the corresponding capacity region is derived, which is the same as that of the compound Poisson multiple access channel with each receiver decoding both messages. For the...
Provided By Institute of Electrical & Electronic Engineers
-
Self Adaptive Effective Aperture for Multi Antenna Set-Ups in Faded Wireless Channels
In mobile communication, a less explored technique to mitigate fading effects is based on the physical parameter of the transmitter by varying the physical dimension of the transmitting antenna. This paper deals with a self adaptive system to eliminate severe fading effects in different multi antenna set-ups by adaptively updating...
Provided By Interscience Open Access Journals
-
Local Messages for Smartphones
This paper describes a new model for local messaging based on the network proximity. The authors present a novelty mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. Their mobile mashup combines passive monitoring for smart phones and cloud based messaging for mobile operational systems. Passive monitoring can determine...
Provided By Lomonosov Moscow State University
-
Secure Contactless Smart Card Transactions on Mobile Devices
This paper presents work in progress to explore the utility of Near Field Communication technology to secure mobile financial services. The objective is to evaluate the potential of this approach as an upcoming technology for mobile cash transactions. The paper argues that Near Field Communication technology offers a feasible solution...
Provided By University of the Western Cape
-
Call Capacity for Voice Over Internet Protocol on Wireless Mesh Networks
This paper describes work in progress on call capacity optimization for voice over Internet Protocol on wireless mesh networks. In a developing country such as South Africa, evidence has shown that rural inhabitants find it difficult to afford the voice services offered by cellular networks. Voice over Internet Protocol is...
Provided By University of the Western Cape
-
An Intuitive Billing System for a Tradition Wifi and Mesh WLAN Network
South Africa "Dual economy" as acknowledged in the 2003 State of the Nation address, has persisted and is evident in the "Digital divide" with plethora of ICT4D projects. A number of ICT4D projects have not adequately noted the dynamics of the "Dual economy" in the rural areas where majority of...
Provided By University of the Western Cape
-
Quality of Service-Aware Routing for Static Mesh Networks With Mobile Nodes
This paper describes work in progress to explore a quality of service based routing protocol suitable for a hybrid wireless mesh network. A hybrid network has both static and mobile wireless mesh routers. The combination of static and mobile routers can increase the reach and redundancy of an ad hoc...
Provided By University of the Western Cape
-
Rationalisation of Heterogeneous Rural Internet Protocol Networks to Achieve Sustainability
Rural Internet Protocol networks are physically and logically like any other Internet Protocol network in urban areas. However, they face challenges regarding unreliable power, limited bandwidth and unqualified network support. Each factor results in lowering network availability. Related work indicates the importance of addressing these challenges as the key to...
Provided By University of the Western Cape
-
Wireless Mesh Network and General Packet Radio Service Interworking
This paper reports work in progress on interworking between wireless mesh network and general packet radio service. Since there is no solid mobility management in WMN environment, mobility protocols for wired networks are used as guidelines. These mobility protocols are studied and compared in a network simulator focusing on mobility...
Provided By University of the Western Cape
-
Experimental Demonstration of an OpenFlow Based Software-Defined Optical Network Employing Packet, Fixed and Flexible DWDM Grid Technologies on an International Multidomain Testbed
Software Defined Networking (SDN) and flexible grid optical transport technology are two key technologies that allow network operators to customize their infrastructure based on application requirements and therefore minimizing the extra capital and operational costs required for hosting new applications. In this paper, for the first time the authors report...
Provided By University of Brighton
-
Motes in the Jungle: Lessons Learned From a Short-Term WSN Deployment in the Ecuador Cloud Forest
The authors study the characteristics of the communication links of a wireless sensor network in a tropical cloud forest in Ecuador, in the context of a wildlife monitoring application. Thick vegetation and high humidity are in principle a challenge for the IEEE 802.15.4 radio they employed. They performed experiments with...
Provided By University of Brighton
-
Influence of Laser Linewidth and Modulation Level for Coherent Optical OFDM With Punctured LDPC Codes
Recently, COherent optical OFDM (CO-OFDM) has been proposed for optical networks to combat chromatic dispersion. CO-OFDM system has been successfully processed and recovered for transmitted signals without optical chromatic dispersion compensation. However, in optical links, the available optical power is limited due to fiber nonlinearity, and power consumption. As previously...
Provided By Chiba University
-
Connectivity of Vehicular Ad Hoc Networks in Downtown Scenarios
The authors study the connectivity in vehicular ad-hoc networks in a downtown scenario, where the mobility of vehicles is constrained on a lattice-shaped road network. They theoretically investigate the connectivity under the Poisson-positioning assumption, where vehicles are positioned according to a Poisson process on each road at any arbitrary instants....
Provided By Chiba University
-
Home Agent Architecture and Algorithms for Mobility Management in Mobile IP Networks
This paper proposes new Home Agent architecture and algorithms for real-time mobility management in mobile IP networks. The proposed architecture and algorithms offer a better performance based on the Call-to-Mobility Ratio (CMR) and require less time for the location update and the tunneling compared with the Mobile IP model. These...
Provided By Science Publications
-
Predicting Packet Transmission Data Over IP Networks Using Adaptive Neuro-Fuzzy Inference Systems
The statistical modeling for predicting network traffic has now become a major tool used for network and is of significant interest in many domains: adaptive application, congestion and admission control, wireless, network management and network anomalies. To comprehend the properties of IP-network traffic and system conditions, many kinds of reports...
Provided By Science Publications
-
Key Success Factors of 3rd Generation Mobile Network Services for M-Commerce in Malaysia
While there has been a great deal of excitement in view of M-commerce, very little is actually known about conditions and critical success factors for successful introduction of the 3rd generation mobile network services here in Malaysia. This paper investigates the factors for successful diffusion of 3G network services and...
Provided By Science Publications
-
Location Based Throughput Maximization Routing in Energy Constrained Mobile Ad-Hoc Network
In wireless Ad-hoc network, power consumption becomes an important issue due to limited battery power. One of the reasons for energy expenditure in this network is irregularly distributed node pattern, which impose large interference range in certain area. To maximize the lifetime of ad-hoc mobile network, the power consumption rate...
Provided By Science Publications
-
Misbehaving Node Detection in Mobile Ad Hoc Networks Using Multi Hop Acknowledgement Scheme
For any node in a Mobile Ad hoc Network conservation of battery power and bandwidth are the priority. Hence, they try to reduce the overload they would otherwise incur when they forward packets. This selfish behavior of a node affects the throughput of the network. The nodes may also choose...
Provided By Science Publications
-
Mobile Agents in Heterogeneous Networks: A Look on Performance
Mobile agents can be seen as a new paradigm for distributed computing. One characteristic of mobile agents is their autonomy and pro-activity. This paper present a framework designed on top of PMADE (Platform for Mobile Agent Distribution and Execution) to support research in this domain. The authors' framework consists of...
Provided By Science Publications
-
MPLS Based Architecture for Mobility and End-to-End QoS Support in Fourth Generation Mobile Networks
Cellular mobile networks have evolved rapidly in the past few years. At a time when the industry is upgrading its second generation networks to 3G technology, the research community is looking into fourth generation networks and its challenges. Each generation of networks brings in a wealth of solutions, technologies and...
Provided By Science Publications
-
Nodes Density and Broadcast Management in Heterogeneous Environments of Mobile Ad-Hoc Networks
Mobile Ad hoc NETworks (MANETs) are basically non-infrastructure based networks with an undefined network size. This is due to the ubiquitous nature of the MANETs that allows any device to be attached to a certain network anytime. It is only limited by range of the wireless transmission. Thus, there are...
Provided By Science Publications
-
An Optimal Permutation Routing Algorithm on Full-Duplex Hexagonal Networks
In the permutation routing problem, each processor is the origin of at most one packet and the destination of no more than one packet. The goal is to minimize the number of time steps required to route all packets to their respective destinations, under the constraint that each link can...
Provided By University of Maribor
-
A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network
In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less...
Provided By Science Publications
-
Congestion Free Routing in Adhoc Networks
A Mobile Ad-Hoc Network (MANET) is a temporary network; the mobile devices in an ad-hoc network are communicating through wireless links without any pre-existing infrastructure. The one major problem of this network is network congestion, it may take place at any intermediate nodes when data packets are traveling from source...
Provided By Science Publications
-
A Fault Tolerant Resource Allocation Architecture for Mobile Grid
In this paper, the authors have developed a fault tolerant technique to improve reliability in mobile grid environment. The proposed technique handles both resource and network failure and present recovery techniques also. When the job is assigned to the node, acknowledgement must reach monitoring agent within certain time interval else...
Provided By Science Publications
-
Buffer Pocketing and Pre-Checking on Buffer Utilization
A basic NoC architecture is composed of routers, communication links between routers and a Network-Interface Component (NIC) between each pair of router and processing element. NoC allows much higher bandwidth through parallel communication. Each router can accept at the same time the flits arriving from all of the input channels...
Provided By Science Publications
-
Application of Adaptive Neuro-Fuzzy Inference System for Information Security
Computer networks are expanding at very fast rate and the number of network users is increasing day by day, for full utilization of networks it need to be secured against many threats including malware, which is harmful software with the capability to damage data and systems. Fuzzy rule based classification...
Provided By Science Publications
-
Adhoc on Demand Multipath Reliable and Energy Aware Quality of Service Routing for Mobile Adhoc Networks
Traditional wireless and cellular offer a limited range of mobile communication and are constrained in their deployment by their need for underlying network infrastructure. Demands for user mobility have created interest in the development of an emerging class of self organizing, rapidly deployable network architecture called Mobile Ad-hoc Networks. Mobile...
Provided By Science Publications
-
Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication
A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...
Provided By Science Publications
-
Generic Algorithm With Varying Block Sizes to Improve the Capacity of a Wireless Communications Networks
In wireless communication and particularly in wireless underwater communication, mobile radio links usually exhibit severe multipath fading that yields Serious degradation in the link-to-Noise Ratio (SNR) and consequently leads to higher Bit Error Rate (BER). Fading compensations like increasing link budget margin or interleaving with channel coding are typically required...
Provided By Science Publications
-
Energy Efficient Hidden Markov Model Based Target Tracking Mechanism in Wireless Sensor Networks
Wireless Sensor Networks (WSN) have become one of the most promising and interesting areas over the past few years. These networks are very large systems comprised of small sized, low power, low-cost sensor devices which collect information about the physical environment. The flexibility, self-organization, fault tolerance, high sensing fidelity, low-cost...
Provided By Science Publications
-
Performance Analysis of Clustering Protocols in Mobile Ad Hoc Networks
Network clustering is an important technique widely used in efficient MANETs network management, hierarchical routing protocol design, network modeling, Quality of Service, etc. Recently many researchers are focusing on clustering which is one of the fundamental problems in mobile ad hoc networks. This paper presents the descriptions of recently proposed...
Provided By Science Publications
-
Modelling And Forecasting The Yield Curve Under Model Uncertainty
This paper proposes a procedure to investigate the nature and persistence of the forces governing the yield curve and to use the extracted information for forecasting purposes. The latent factors of a model of the Nelson-Siegel type are directly linked to the maturity of the yields through the explicit description...
Provided By European Central Bank
-
Modelling Global Trade Flows: Results From A GVAR Model
This paper uses a Global Vector Auto-Regression (GVAR) model in a panel of 21 emerging market and advanced economies to investigate the factors behind the dynamics of global trade flows, with a particular view on the issue of global trade imbalances and on the conditions of their unwinding. The GVAR...
Provided By European Central Bank
-
Forecasting With DSGE Models
In this paper the authors review the methodology of forecasting with log-linearised DSGE models using Bayesian methods. They focus on the estimation of their predictive distributions, with special attention being paid to the mean and the covariance matrix of h-step ahead forecasts. In the empirical analysis, they examine the forecasting...
Provided By European Central Bank
-
Nominal And Real Wage Rigidities. In Theory And In Europe
In this paper the author studies the relation between Real Wage Rigidity (RWR) and nominal price and wage rigidity. The author shows that in a standard DSGE model RWR is mainly affected by the interaction of the two nominal rigidities and not by other structural parameters. The degree of RWR...
Provided By European Central Bank
-
Power Management in Wireless Sensor Networks With High-Consuming Sensors
Wireless Sensor Networks (WSNs), usually battery-powered, thus very energy-constrained, present energy efficiency as the main challenge. To reduce the overall energy consumption of the network, research community has been tackling Power Management (PM) techniques on different levels - sensing, communication, computation and energy harvesting. Usually in WSNs the communication consumes...
Provided By University of Zagreb
-
Modeling of Session Initiation Protocol Invite Transaction Using Colored Petri Nets
Wireless mobile communications have experienced the phenomenal growth through last decades. The advances in wireless mobile technologies have brought about a demand for high quality multimedia applications and services. For such applications and services to work, signaling protocol is required for establishing, maintaining and tearing down multimedia sessions. The Session...
Provided By University of Zagreb
-
The MAgNet: Agent-Based Middleware Enabling Social Networking for Mobile Users
Now-a-days social network services play an important role in users' everyday lives. This is especially emphasized in lives of users that belong to Generation Y. Young people often communicate and share various personal information with their family, friends or colleagues through virtual communities that are based on social relations. By...
Provided By University of Zagreb
-
CAOVA: A Car Accident Ontology for VANETs
In a near future, vehicles will be provided with a variety of new sensors capable of gathering information from their surroundings. These vehicles will also be capable of sharing the harvested information via Vehicular Ad hoc NETworks (VANETs) with nearby vehicles, or with the emergency services in case of an...
Provided By University of Zagreb
-
Resource Management in 2-Tier Opportunistic Spectrum Access Scenario
Wireless spectrum increasingly becomes a scarce and deficient resource as the number of wireless application profiles and devices rapidly grows. Therefore, management of wireless spectrum resources is a quintessential part of future wireless networks guaranteeing optimal system performance and maximum spectrum resource utilization. This paper analyzes possibilities for spectrum resource...
Provided By Ss.Cyril and Methodius University
-
Cooperative Spectrum Sensing in Ad-Hoc Networks
Spectrum sensing is a distinct feature of cognitive ad-hoc nodes that have the ability to opportunistically use vacant spectrum bands for its own communication purposes. Possible cooperation among the nodes may prove vital for increasing network performance. It yields the cognitive ad-hoc nodes to exchange relevant environmental and context information...
Provided By Ss.Cyril and Methodius University
-
Folding ADC Design for Software Defined GSM Radio-Mobile Station Receiver
Software Defined Radio is emerging as a new trend in the field of wireless communication. The Software Defined Radio is aimed for providing single radio unit, which can operate on different wireless and mobile standards only by modifying its software. The study of wireless communication systems reveals that integration of...
Provided By Walchand College of Engineering